Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tools
biblio
Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine Learning
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
Databases
vector
Matrices
k-nearest neighbor search
clustering methods
Bayes method
nearest neighbor search
supervised learning
Classification algorithms
Microprogramming
Predictive Metrics
reverse engineering
Software
Measurement
neural network
supply chain management
Libraries
tools
internet
graph theory
pubcrawl
machine learning
Support vector machines
Task Analysis
biblio
HAC-T and Fast Search for Similarity in Security
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
nearest neighbor search
Trend Locality Sensitive Hashing (TLSH)
tree-based index
tools
threshold based hierarchical agglomerative clustering algorithm
standards
similarity digests
security operations center operators
security of data
security analysts
security
search problems
pubcrawl
Predictive Metrics
nearest neighbour methods
Approximate Nearest Neighbour
Measurement
malware
Indexes
Hierarchical Agglomerative Clustering (HAC)
HAC-T
Fuzzy Hashing
fast nearest neighbor search techniques
Cryptography
computer viruses
clustering technique
Clustering algorithms
clustering
cluster quality
cluster malware
biblio
Toward a Natural Language-Based Approach for the Specification of Decisional-Users Requirements
Submitted by aekwall on Mon, 02/22/2021 - 12:40pm
Multidimensional Model
Data Warehouse technology
decision-makers
decision-making processes
decisional-users requirements
DW design
DW model
DW multidimensional schema
great challenge research domain
multidimensional components
Data Warehouse
natural language
natural language NL-template
NL-templates
OLAP
On-Line-Analytical-Processing queries
query-like English sentences
requirement-gathering phase
Star schema
natural language processing
Ontologies
Task Analysis
Resiliency
Human behavior
pubcrawl
query processing
tools
Decision Making
data analysis
Scalability
Writing
Data Analytics
data warehouses
cleaning
critical task
Natural languages
complex task
Constellation schema
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 12:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
Watchman: Monitoring Dependency Conflicts for Python Library Ecosystem
Submitted by aekwall on Mon, 02/08/2021 - 12:40pm
Monitoring
Scalability
Resiliency
pubcrawl
Metrics
tools
Libraries
automation
Python
software engineering
Ecosystems
software ecosystem
Human Factors
Compositionality
Cyber Dependencies
dependency conflicts
biblio
ARtect, an augmented reality educational prototype for architectural design
Submitted by grigby1 on Wed, 02/03/2021 - 12:11pm
resilience
digital instrument
education
educational interactive tool
exterior environments
Human behavior
Human Factors
immersive tool
privacy
pubcrawl
rendering (computer graphics)
design proposal
Solid modeling
solid modelling
Three-dimensional displays
tools
Two dimensional displays
Unity 3D
user interfaces
user-friendly interface
virtual reality
visualization
augmented reality
2d graphic
2D graphic visualisation
3D carton models
3d models
application
architectural design process
architectural project
architecture
ARtect
artists
immersive systems
augmented reality educational prototype
CAD
composability
computer aided instruction
computer architecture
custom-made 3D model visualisation
cyber physical systems
data visualisation
design
biblio
Experiment Design for Complex Immersive Visualisation
Submitted by grigby1 on Wed, 02/03/2021 - 12:11pm
Information systems
visualisation
tools
software performance
resilience
pubcrawl
privacy
network forensics
military computing
military communication
immersive systems
Human Factors
human computer interaction
Human behavior
Data visualization
data analysis
cyber warfare
cyber physical systems
composability
biblio
Design of an Augmented Reality System for Immersive Learning of Digital Electronic
Submitted by grigby1 on Wed, 02/03/2021 - 12:08pm
immersive learning
tools
resilience
pubcrawl
privacy
Multimedia systems
mobile learning
mobile computing
Mobile Applications
Mobile Application
Logic gates
Libraries
ios
interactive systems
interactive app
immersive systems
Human Factors
Human behavior
electronic engineering education
electronic engineering computing
education
digital electronics
Digital circuits
cyber physical systems
computer aided instruction
composability
Cameras
augmented reality system
augmented reality
biblio
Establishing Trust in Binary Analysis in Software Development and Applications
Submitted by aekwall on Mon, 02/01/2021 - 10:41am
Binary codes
vulnerability reports
source security
software programmer trust
security vulnerability minimization
knowledge elicitations
knowledge acquisition
implementation risk assessment
binary release metadata
binary component
binary code components
binary code behavior
binary analysis tools
binary analysis techniques
human trust
security of data
binary code
data loss
trust
Binary Analysis
software development
software engineering
computer security
Libraries
tools
standards
pubcrawl
Human behavior
Trusted Computing
Software
« first
‹ previous
…
26
27
28
29
30
31
32
33
34
…
next ›
last »